General

  • Target

    39dd164fd6cf3c0c7ffc63a654c01a8dbin.zip

  • Size

    2.4MB

  • Sample

    240101-yq9bbahaen

  • MD5

    7969298a6030dc2178662ae1b1d945c3

  • SHA1

    4a480b660a932c0ed9c56807f7ddd191c3c877c5

  • SHA256

    bd456a902ea03b9832f591f858829997826c356fe0746400cb381e891680ee21

  • SHA512

    52ae3111f724336c256cdd6d3241fca28fe33ca0f9c446cfec4bba48fd5699a7701ff2a2563cc3e5c6a6f89c534756b5cbd31fa032bae87b958c3f28ddccb334

  • SSDEEP

    49152:MpO1Yo7bTQ40al4zQE4pNvf0/k2BgSMS4jvo1nuy+utU6u3vb3eKMFh5Bz:/1Y3aNpgk2GHo8GnavjJMX

Malware Config

Targets

    • Target

      4b8896554332d025010afb7c2d634ae9ff5294433f534652aa1cf0cf2a0b1ac1.exe

    • Size

      2.5MB

    • MD5

      39dd164fd6cf3c0c7ffc63a654c01a8d

    • SHA1

      ef36ccb87b338c94e67a6c7c4a5293e7222436af

    • SHA256

      4b8896554332d025010afb7c2d634ae9ff5294433f534652aa1cf0cf2a0b1ac1

    • SHA512

      373ff3350b876ed9691ef1c8e920eb4b18ba887de8e8028899b9d294a055148810d2d368b57ff623aedd17605ddb8295a089641ac3a0431c02e282cfbb152412

    • SSDEEP

      49152:1TjxpDC2v28vf+yGNbnIzLNckkmTmAl6xBaUmUUshTsdfIl+nMXf5H:xPCL6fpGNDQRc6T8VRx8nMP5H

    • Detected google phishing page

    • Modifies Windows Defender Real-time Protection settings

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks